IDC PlanScape: Threat Intelligence Solutions TAGS: threat intelligence “Threat intelligence is a foundational component of a modern cybersecurity program,” says Mike Chapple, adjunct analyst with IDC’s IT Executive …Continue reading →
October 1, 2023
IDC PlanScape: Threat Intelligence Solutions TAGS: threat intelligence “Threat intelligence is a foundational component of a modern cybersecurity program,” says Mike Chapple, adjunct analyst with IDC’s IT Executive …Continue reading →
The CIO’s Playbook: Preparing for Data Breach Notifications TAGS: data breach | incident handling | incident response “The days and hours immediately after a data breach are critical,” said Mike Chapple, adjunct research analyst with IDC’s IT …Continue reading →
5 Tips for Updating a Cybersecurity Incident Response Plan TAGS: incident handling | incident response Many security teams are operating with incident response plans that haven’t been updated — or even looked at — in …Continue reading →
IDC’s Worldwide Digital Transformation Use Case Taxonomy, 2019: Higher Education “To continue to be relevant to society and to students, all institutions face the need to transform their academic capabilities …Continue reading →
Cloud Access Security Brokers Give IT Staff Visibility and Oversight TAGS: CASB Colleges and universities are rapidly expanding their use of cloud services, ranging from complete infrastructure deployments to specialized applications. This leaves cybersecurity …Continue reading →
Security Automation: Eight Things You Can Do Now for Security at Scale TAGS: security automation “Automation plays an increasingly important role in cybersecurity programs,” said Mike Chapple, adjunct research analyst at IDC’s IT Executive Programs. “Automation serves …Continue reading →
IDC PlanScape: Launching a Bug Bounty Program TAGS: bug bounty “Bug bounty programs incentivize security researchers to test your systems for weaknesses and then provide you with an opportunity to fix the …Continue reading →
5 Steps to Integrate a Business’ Security Solutions TAGS: SIEM Your organization probably has a diverse set of security tools working to help reduce your risk profile and combat active …Continue reading →
4 Ways to Keep Sensitive Data from Escaping to the Public Cloud TAGS: cloud computing | data loss prevention Think about how many cloud services you use every day. Chances are that it’s a mixture of services managed by your employer and others …Continue reading →
How to Choose Between Penetration Tests and Vulnerability Scans TAGS: penetration testing | vulnerability scanning Even seasoned cybersecurity professionals confuse penetration tests with vulnerability scans. Both play an important role in the security practitioner’s toolkit, but …Continue reading →